Skip to main content

Managing Uncertainty and Complexity: Emerging Challenges in Cyber Security

  • Conference paper
  • First Online:
Information Systems and Technologies (WorldCIST 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 468))

Included in the following conference series:

Abstract

Uncertainty and complexity are two key issues to understand and explore in the current digital context. The management of these two issues becomes relevant for cyber security as the increase in connectivity and convergence of technologies creates not only opportunities for organizations and nations, but also spaces of instability and disruption that must be identified, anticipated and addressed. Therefore, this paper presents some concrete proposals to manage uncertainty and complexity in order to break the status quo of certainties and assume instability and volatility as natural sources in strategic and tactical decision making for both security/cyber security professionals and executives of companies and nations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 234.33
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 295.39
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Interpol. National cybercrime strategy guidebook. https://www.interpol.int/en/content/download/16455/file/National%20Cybercrime%20Strategy%20Guidebook.pdf. Accessed 15 Nov 2021

  2. Cano, J.: La “falsa sensación de seguridad”. El reto de incomodar las certezas de los estándares y tratar de “domesticar” los inciertos. Rev. Sistemas. Asoc. Colomb. Ingen. Sistem. 159, 82–95 (2021). https://doi.org/10.29236/sistemas.n159a6

  3. Rosa, E., Renn, O., McCright, A.: The risk society revisited. In: Social Theory and Governance. Temple University Press, Philadelphia (2014)

    Google Scholar 

  4. Espejo, R., Reyes, A.: Sistemas organizacionales. El Manejo de la Complejidad con el Modelo del Sistema Viable. Universidad de los Andes-Universidad de Ibagué, Bogotá (2016)

    Google Scholar 

  5. Perrow, C.: Normal accidents. In: Living with High-Risk Technologies. Princeton University Press, Princeton (1999)

    Google Scholar 

  6. Sokovic, M., Pavletic, D., Kern Pipan, K.: Quality improvement methodologies – PDCA cycle, RADAR matrix, DMAIC and DFSS. J. Achiev. Mater. Manuf. Eng. 43(1), 476–483 (2010)

    Google Scholar 

  7. Briggs, B., Buchholz, S., Sharma, S.K.: Macro technology forces. A second look at the pillars of the past, current, and future innovation. Deloitte Insights (2020). https://www2.deloitte.com/us/en/insights/focus/tech-trends/2020/macro-technology-trends.html. Accessed 15 Nov 2021

  8. Sieber, S., Zamora, J.: The Cyber security Challenge in a High Digital Density World. European Business Review. November (2018). https://www.europeanbusinessreview.com/the-cybersecurity-challenge-in-a-high-digital-density-world/. Accessed 15 Nov 2021

  9. KPMG. Vientos de cambio. La gestión de riesgos en el mundo digital (2019). https://www.tendencias.kpmg.es/wp-content/uploads/2019/04/Informe_Riesgos_Abril2019.pdf. Accessed 15 Nov 2021

  10. Cano, J.: The AREM window: a strategy to anticipate risk and threats to enterprise cyber security. ISACA J. 5 (2017). https://www.isaca.org/resources/isaca-journal/issues/2017/volume-5/the-arem-window-a-strategy-to-anticipate-risk-and-threats-to-enterprise-cyber-security. Accessed 15 Nov 2021

  11. Menon, G., Kyung, E.: When More Information Leads to More Uncertainty. Harvard Business Review (2020). https://hbr.org/2020/06/when-more-information-leads-to-more-uncertainty. Accessed 15 Nov 2021

  12. Watzlawick, P., Krieg, P. (comps.): El ojo del observador. Contribuciones al Constructivismo. Homenaje a Heinz Von Foerster. Gedisa, Barcelona (1995)

    Google Scholar 

  13. Ashby, W.R.: Introduction to cybernetics. In: Second Impression. Chapman & Hall, London (1957). http://pcp.vub.ac.be/books/IntroCyb.pdf. Accessed 15 Nov 2021

  14. Meyer, R., Kunreuther, H.: The ostrich paradox. In: Why We Underprapare for Disasters. Wharton Digital Press, Philadelphia (2017)

    Google Scholar 

  15. Schoemaker, P.J.H.: Scenario Planning. In: Augier, M., Teece, D. (eds.) The Palgrave Encyclopedia of Strategic Management. Palgrave Macmillan, London (2016). https://doi.org/10.1057/978-1-349-94848-2_652-1

  16. Hoehn, A., et al.: Strategic choices for a turbulent world. In: Pursuit of Security and Opportunity. Rand Corporation. Research Report (2017). https://doi.org/10.7249/RR1631

  17. Cano, J.: Modelo ADAM. Una estrategia conceptual para repensar los ataques digitales y actualizar las estrategias de seguridad y control vigente. Global Strategy. Global Report No. 22 (2021). https://global-strategy.org/modelo-adam-una-estrategia-conceptual-para-repensar-los-ataques-digitales-y-actualizar-las-estrategias-de-seguridad-y-control-vigente/. Accessed 15 Nov 2021

  18. Björck, F., Henkel, M., Stirna, J., Zdravkovic, J.: Cyber resilience – fundamentals for a definition. In: Rocha, A., Correia, A.M., Costanzo, S., Reis, L.P. (eds.) New Contributions in Information Systems and Technologies. AISC, vol. 353, pp. 311–316. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16486-1_31

    Chapter  Google Scholar 

  19. Martínez, J.: Aprender del futuro. Newsletter No. 179 (2021). http://www.javiermartinezaldanondo.com/n179-aprender-del-futuro/. Accessed 15 Nov 2021

  20. Edmondson, A.: The fearless organization. In: Creating Psychological Safety in the Workplace for Learning, Innovation, and Growth. Wiley, Hoboken (2018)

    Google Scholar 

  21. Weil, P., Woerner, S.: What’s Your Digital Business Model? Six Questions to Help You Build the Next-Generation Enterprise. Harvard Business Review Press, Boston (2018)

    Google Scholar 

  22. Day, G., Schoemaker, P.: See soon, act faster. In: How Vigilant Leader Thrive in an Era of Digital Turbulence. MIT Press, Cambridge (2019)

    Google Scholar 

  23. Taleb, N.: Antifrágil. Las Cosas que se Benefician del Desorden. Paidos, Barcelona (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeimy J. Cano M. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cano M., J.J. (2022). Managing Uncertainty and Complexity: Emerging Challenges in Cyber Security. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F. (eds) Information Systems and Technologies. WorldCIST 2022. Lecture Notes in Networks and Systems, vol 468. Springer, Cham. https://doi.org/10.1007/978-3-031-04826-5_19

Download citation

Publish with us

Policies and ethics